메뉴 건너뛰기




Volumn 5965 LNCS, Issue , 2010, Pages 166-181

Formal verification of application-specific security properties in a model-driven approach

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION-SPECIFIC; CRITICAL APPLICATIONS; CRITICAL SYSTEMS; CRYPTOGRAPHIC PROTOCOLS; E-COMMERCE APPLICATIONS; ERROR PRONES; EXECUTABLE CODES; FORMAL SPECIFICATION; FORMAL VERIFICATIONS; MODEL DRIVEN APPROACH; SECURITY PROPERTIES; UML MODEL; VERIFICATION METHOD;

EID: 77949466195     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-11747-3_13     Document Type: Conference Paper
Times cited : (17)

References (20)
  • 2
    • 84937391830 scopus 로고    scopus 로고
    • [Bel01] Bella, G.: Mechanising a Protocol for Smart Cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, 2140, p. 19. Springer, Heidelberg (2001)
    • [Bel01] Bella, G.: Mechanising a Protocol for Smart Cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, p. 19. Springer, Heidelberg (2001)
  • 3
    • 68249091950 scopus 로고    scopus 로고
    • Automatic Verification of Correspondences for Security Protocols
    • Bla09
    • [Bla09] Blanchet, B.: Automatic Verification of Correspondences for Security Protocols. Journal of Computer Security 17(4), 363-434 (2009)
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 363-434
    • Blanchet, B.1
  • 5
    • 19744367735 scopus 로고    scopus 로고
    • OFMC: A symbolic model checker for security protocols
    • BMV05
    • [BMV05] Basin, D.A., Mödersheim, S., Viganò, L.: OFMC: A symbolic model checker for security protocols. Int. J. Inf. Sec. 4(3), 181-208 (2005)
    • (2005) Int. J. Inf. Sec , vol.4 , Issue.3 , pp. 181-208
    • Basin, D.A.1    Mödersheim, S.2    Viganò, L.3
  • 6
    • 55049132505 scopus 로고    scopus 로고
    • +00] Balser, M., Reif, W., Schellhorn, G., Stenzel, K., Thums, A.: Formal system development with KIV. In: Maibaum, T. (ed.) FASE 2000. LNCS, 1783, p. 363. Springer, Heidelberg (2000)
    • +00] Balser, M., Reif, W., Schellhorn, G., Stenzel, K., Thums, A.: Formal system development with KIV. In: Maibaum, T. (ed.) FASE 2000. LNCS, vol. 1783, p. 363. Springer, Heidelberg (2000)
  • 9
    • 37549064606 scopus 로고    scopus 로고
    • [HGRS07] Haneberg, D., Grandy, H., Reif, W., Schellhorn, G.: Verifying Smart Card Applications: An ASM Approach. In: Davies, J., Gibbons, J. (eds.) IFM 2007. LNCS, 4591, pp. 313-332. Springer, Heidelberg (2007)
    • [HGRS07] Haneberg, D., Grandy, H., Reif, W., Schellhorn, G.: Verifying Smart Card Applications: An ASM Approach. In: Davies, J., Gibbons, J. (eds.) IFM 2007. LNCS, vol. 4591, pp. 313-332. Springer, Heidelberg (2007)
  • 12
    • 37849037975 scopus 로고    scopus 로고
    • JW08] Jones, C, Woodcock, J, eds, Springer, Heidelberg
    • [JW08] Jones, C., Woodcock, J. (eds.): Formal Aspects of Computing, vol. 20 (1). Springer, Heidelberg (2008)
    • (2008) Formal Aspects of Computing , vol.20 , Issue.1
  • 13
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
    • Low96, Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
    • [Low96] Lowe, G.: Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 14
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • Mea96
    • [Mea96] Meadows, C.: The NRL protocol analyzer: An overview. Journal of Logic Programming 26(2), 113-131 (1996)
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 15
    • 70349673753 scopus 로고    scopus 로고
    • [MSGR09] Moebius, N., Stenzel, K., Grandy, H., Reif, W.: SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications. In: Third International Workshop on Secure Software Engineering, SecSE, at ARES 2009. IEEE Press, Los Alamitos (2009)
    • [MSGR09] Moebius, N., Stenzel, K., Grandy, H., Reif, W.: SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications. In: Third International Workshop on Secure Software Engineering, SecSE, at ARES 2009. IEEE Press, Los Alamitos (2009)
  • 18
    • 0031643297 scopus 로고    scopus 로고
    • The Inductive Approach to Verifying Cryptographic Protocols
    • Pau98
    • [Pau98] Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. J. Computer Security 6 (1998)
    • (1998) J. Computer Security , vol.6
    • Paulson, L.C.1
  • 19
    • 77952332440 scopus 로고    scopus 로고
    • Formal support to security protocol development: A survey
    • PM08
    • [PM08] Lopez Pimental, J.C., Monroy, R.: Formal support to security protocol development: A survey. Computacion y Sistemas 12(1) (2008)
    • (2008) Computacion y Sistemas , vol.12 , Issue.1
    • Lopez Pimental, J.C.1    Monroy, R.2
  • 20
    • 33750115438 scopus 로고    scopus 로고
    • First Steps in the Verified Software Grand Challenge
    • Woo06
    • [Woo06] Woodcock, J.: First Steps in the Verified Software Grand Challenge. IEEE Computer 39(10), 57-64 (2006)
    • (2006) IEEE Computer , vol.39 , Issue.10 , pp. 57-64
    • Woodcock, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.